Перейти к содержимому
View in the app

A better way to browse. Learn more.

Zloplay community

A full-screen app on your home screen with push notifications, badges and more.

To install this app on iOS and iPadOS
  1. Tap the Share icon in Safari
  2. Scroll the menu and tap Add to Home Screen.
  3. Tap Add in the top-right corner.
To install this app on Android
  1. Tap the 3-dot menu (⋮) in the top-right corner of the browser.
  2. Tap Add to Home screen or Install app.
  3. Confirm by tapping Install.

Featured Replies

Опубликовано:

Now, I understand NTA already has enough to do right now, and with the Nuketown update being so highly anticipated, it's not hard to understand why.

 

However, it seems even though the latest revision of IW5M should have fixed the GUID spoofer issue (according to what I've heard around here), it seems it hasn't.

 

Recently (today, in fact), the WarZone servers (now, before you say I'm posting this with bias since I'm admin there - I just need to inform so more servers don't fall victim) have been attacked by this GUID spoofer, nicknamed Halloweed01 (he was already reported in the Spanish section - viewtopic.php?f=21&t=22059&p=179173). The WarZone servers are running the latest update (you know, the one where the server crashes with every odd character), so that should not be the reason.

 

More servers could have already fallen victim - in fact, they already have, according to link posted above. I hope that you will be able to find a solution soon after working on all the latest updates, so that the server amount in IW5M continues to thrive, instead of fall due to too many issues due to the GUID spoofing issue that currently exists within the current IW5M and previous IW5M revisions.

Опубликовано:

'attacked'

 

1) ban by ip address

2) enable admins by ip or some secret password

Опубликовано:
'attacked'

Yes, attacked. It got to such an extent that the WarZone servers owner completely dropped support for IW5M and shut down all IW5M servers until further notice.

 

Announcement regarding Modern Warfare 3

All Modern Warfare 3 servers have been closed down until further notice. Please do not post any ban appeals as MW3 servers may never return.

Опубликовано:

in TF2 there are many free-to-play hackers, solution: ban by ip, not by id.

Those servers shutting down just says that they can't be bothered doing their jobs as admins.

Опубликовано:
in TF2 there are many free-to-play hackers, solution: ban by ip, not by id.

Those servers shutting down just says that they can't be bothered doing their jobs as admins.

That's the thing, we have banned by IP multiple times and they keep returning

Опубликовано:
Don't play IW5M => Problem solved.

Your very helpful.

 

Also regarding the IP banning, VPN's do exist. We have added a ping limit to stop mw2player and Kenshin joining the WarZone servers but this new Halloweed guy has a ping lower than that. If we were to lower the ping limit, we would loose a lot of players. In a way, you fail to realize that it is the games and Anti Cheat's fault. I, alone, banned 5 users from a server for aimbotting in 1 game. Server owners should not have to 'deal' with these faggots because they keep coming back.

Опубликовано:
I gave NTA and Pigo the aCI bypass they used though I don't know if they've patched it yet.

and how would that help with fixing the NP ticket issue, which I have no means to debug as I don't know what utility/method they use to change the reported ID?

Опубликовано:


Now keep in mind that when you set the admin passwords on the database, it has to be saved as MD5 (on "function" type)

Then

!login [pass]

Keep in mind that the login message will show up on public chat. So you better not login when the spoofer or some snitch is there.

I'm not sure if something like that would fit infinityscript definitions, but it would be useful to have a script that would hide from public chat any message containing "!login". The complicated part is that it has to get to games_mp.log, but not to the in-game chat output.

The ideal would actually be to hide any message starting with "!", since those are just rcon commands.

Опубликовано:
Keep in mind that the login message will show up on public chat. So you better not login when the spoofer or some snitch is there.

The ideal would actually be to hide any message starting with "!", since those are just rcon commands.

add a / in front of the '!'?

that feature has been in for 2 years now

Опубликовано:
I gave NTA and Pigo the aCI bypass they used though I don't know if they've patched it yet.

and how would that help with fixing the NP ticket issue, which I have no means to debug as I don't know what utility/method they use to change the reported ID?

nobody know?

Опубликовано:
I gave NTA and Pigo the aCI bypass they used though I don't know if they've patched it yet.

and how would that help with fixing the NP ticket issue, which I have no means to debug as I don't know what utility/method they use to change the reported ID?

nobody know?

Obviously, no. Also, you might know this already, but they can 'spoof' their xuid to match yours, only if you're registered in the B3 database. Or atleast that's what I think, since someone tried it on me but he couldn't as I was not registered.

Опубликовано:

Do you think that they need to grab the guid from some b3 database when they can just grab it from the forum ID ?

Now... I don't really know how this works, but... let's say that there's some "token" and that the dedicated server checks that token... the explanation for the easy spoofing would be if they managed to check the tokens the same way that the dedicated server does, and clone them. Meaning that they could use our guids by cloning our tokens as long as they're valid (that would also explain the third "dword" that they inject)

 

p.s.: when locking topics such as this one -> viewtopic.php?f=30&t=22339, atleast tell them to use login plugin.

I fucking hate seeing an unresolved topic locked and not being able to post a solution...

Опубликовано:
nobody know?

 

For IW4M its https://dl.dropbox.com/u/23865950/iw4m/ ... 20Hack.exe

 

And it just does:

 

private static IntPtr GUIDAddress = (IntPtr) 0x0649D698; //address where GUID is located

...

WriteProcessMemory(Process.Handle, GUIDAddress, guidBytes, 16, out unused); //write GUID

written in C# me gusta.

Опубликовано:
I gave NTA and Pigo the aCI bypass they used though I don't know if they've patched it yet.

and how would that help with fixing the NP ticket issue, which I have no means to debug as I don't know what utility/method they use to change the reported ID?

nobody know?

NP is yours, you fix it. (like srsly the only people who know whats going on here is you, me, lmaobox, kenshin)

 

I still think that my authentication idea (if you don't know what it is, then go look at logs) should be implemented for IW4M and IW5M, and develop b3 plugins to use the authentication too. (+InfinityScript, but it would just be getting a dvar or so)

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Гость
Ответить в тему...

Сейчас на странице 0

  • Нет пользователей, просматривающих эту страницу

Важная информация

Используя этот сайт, вы соглашаетесь Условия использования.

Configure browser push notifications

Chrome (Android)
  1. Tap the lock icon next to the address bar.
  2. Tap Permissions → Notifications.
  3. Adjust your preference.
Chrome (Desktop)
  1. Click the padlock icon in the address bar.
  2. Select Site settings.
  3. Find Notifications and adjust your preference.